Chapter 1 Section 4

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 1 Section 4 SECTION 4: COMMERCIAL CYBER ESPIONAGE AND BARRIERS TO DIGITAL TRADE IN CHINA Introduction China causes increasing harm to the U.S. economy and security through two deliberate policies targeting the United States: coordi- nated, government-backed theft of information from a variety of U.S.-based commercial enterprises and widespread restrictions on content, standards, and commercial opportunities for U.S. busi- nesses. This section examines how hackers working for the Chinese government—or with the government’s support and encourage- ment—have infiltrated the computer networks of U.S. agencies, contractors, and companies, and stolen their trade secrets, includ- ing patented material, manufacturing processes, and other propri- etary information. The Chinese government has provided that pur- loined information to Chinese companies, including state-owned en- terprises (SOEs). The Chinese government also imposes heavy-handed censorship on Internet content and social media, which has driven from the Chinese market those U.S. companies unwilling to follow the au- thoritarian dictates of the government.* The Chinese government has also begun to censor material originating outside its borders by directing distributed denial of service (DDoS) attacks against U.S.- based information providers. In addition, Beijing has implemented discriminatory regulations and standards in China to limit the commercial opportunities for U.S. companies seeking to conduct le- gitimate business there. The United States is ill prepared to defend itself from cyber espi- onage when its adversary is determined, centrally coordinated, and technically sophisticated, as is the Chinese Communist Party (CCP) and government. The design of the Internet—developed in the United States to facilitate open communication between aca- demia and government, and eventually expanded to include com- mercial opportunities—leaves it particularly vulnerable to spies and thieves. As the largest and most web-dependent economy in the world, the United States is also the largest target for cyber es- pionage of commercial intellectual property (IP). ‘‘Well-resourced, advanced cyber threats that use sophisticated tactics, techniques and procedures are able to bypass [U.S.] conventional security de- ployments almost at-will,’’ according to Jen Weedon, manager of threat intelligence at FireEye, Inc., a cybersecurity firm. ‘‘American * The France-based watchdog group Reporters Without Borders ranked China 175 out of 180 countries in its 2014 worldwide Index of Press Freedom. Among the U.S.-based companies ex- cluded or heavily censored by China are Google, Facebook, Twitter, and Instagram. For more on Chinese censorship, see Beina Xu, ‘‘Media Censorship in China,’’ Council on Foreign Rela- tions, April 7, 2015. (192) VerDate Sep 11 2014 09:25 Nov 12, 2015 Jkt 094682 PO 00000 Frm 00204 Fmt 6601 Sfmt 6601 G:\GSDD\USCC\2015\FINAL\94682_R3.XXX 94682_R3 dkrause on DSKHT7XVN1PROD with USCC 193 companies are being forced to fight a battle against adversaries possessing nation-state capabilities, which is not a fair fight.’’ 1 These activities by China’s government were the subject of the Commission’s June 15 Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China, held shortly after the Of- fice of Personnel Management (OPM) revealed that its computer network experienced an intrusion apparently originating in China. This network breach resulted in the theft of personal information on more than 22 million federal employees, retirees, contractors, applicants for government jobs, and their contacts and families.* Some of the stolen files included SF–86 application forms, which contain detailed personal information of federal workers and con- tractors applying for security clearances.2 Cyber Espionage for Commercial and Strategic Advantage The Cost and Extent of Chinese Cyber Espionage The incidence of sophisticated cyber intrusions into U.S. govern- ment and private computer networks—particularly those involving ‘‘zero-day attacks’’ † and the exfiltration of large amounts of com- mercial data and personally identifiable information ‡—is on the in- crease. Cyber espionage for the purpose of commercial gains ‘‘pre- sents one of the most significant economic and national security challenges facing the United States,’’ according to Paul Tiao, a former Federal Bureau of Investigation (FBI) official who now is an attorney in private practice at Hunton & Williams in Washington, DC, and who testified before the Commission.3 The economic cost of cyber crime and espionage is estimated at $375 billion to $575 billion annually worldwide, or between 15 percent and 20 percent of the value created by the Internet, according to a 2014 study by Intel Corporation’s McAfee cybersecurity branch and the Center for Strategic and International Studies.4 The study estimates that cyber attacks against targets in the United States could result in a permanent reduction of as many as 200,000 U.S. jobs due to lost business income and expenses to repair the damage. The cost of de- fending against such attacks is also increasing. The global market for cybersecurity products and services is estimated to be $77 bil- lion in 2015—about the size of all the Federal Government’s public information technology (IT) spending budget—with spending grow- ing twice as fast as general spending on IT.5 The cost of individual cyber intrusions, which includes detection, repair, and remediation, has also been on the rise. A 2014 survey * For more information on China’s cyber espionage and related activities, see U.S.-China Eco- nomic and Security Review Commission, 2012 Annual Report to Congress, November 2012, and 2013 Annual Report to Congress, November 2013. † Zero-day attacks employ hacking techniques and malware tailored to a specific target rather than generic products available online, which can be detected through the use of commercially available cybersecurity software. ‡ Personally identifiable information can include name, Social Security number, passport num- ber, driver’s license number, taxpayer identification number, financial account or credit card number, banking information, address, date of birth, place of birth, religion, race, weight, activi- ties, employment and medical information, education, fingerprints, retinal scan, voice signature, facial geometry, photographic image, and travel records. Erika McCallister, Tim Grance, and Karen Scarfone, Guide to Protecting the Confidentiality of Personally Identifiable Information: Recommendations of the National Institute of Standards and Technology (Special Publication 800–122), National Institute of Standards and Technology, U.S. Department of Commerce, April 2010. VerDate Sep 11 2014 09:25 Nov 12, 2015 Jkt 094682 PO 00000 Frm 00205 Fmt 6601 Sfmt 6601 G:\GSDD\USCC\2015\FINAL\94682_R3.XXX 94682_R3 dkrause on DSKHT7XVN1PROD with USCC 194 of 59 large U.S. companies by the Ponemon Institute and Hewlett- Packard found the average annual cost of responding to commercial cyber attacks was $12.7 million, up 96 percent from the previous five years.6 During this period, the number of attacks against the 59 firms was up 176 percent, with an average of 138 successful at- tacks each week. The average time taken to detect an attack was 170 days, with an average of 45 days spent resolving the damage. The costs included detection, data recovery, loss of information, and business disruption.7 The cost of a network breach can impact a company in a variety of ways, according to Mr. Tiao. They include: • Loss of IP to a potential competitor that may be able to use it to develop and sell a competing product or to reduce research and development costs; • Reduced incentives for technological innovation by targeted companies; • Loss of confidential business-sensitive information that may, for example, be used by a company to underbid the victim for a lucrative contract or to undermine the victim’s strategy in business negotiations; • Opportunity costs in the form of service and employment dis- ruptions, lost sales and revenues, and reduced trust and use of online commercial activities; • Costs of securing networks, cyber insurance, and recovery from cyber attacks; • Legal fees associated with breach-related litigation and govern- ment enforcement actions; and • Reduced stock prices and reputational harm suffered by victim companies.8 Even companies that have not been victimized have substantial costs to subtract from their bottom lines, according to Mr. Tiao: Prior to an incident taking place, large companies devote extensive financial, staff, and consultant resources to keep- ing information security policies up to date, implementing technical network security programs, developing and exer- cising breach response plans, participating in public-pri- vate and private-private cybersecurity information sharing arrangements, negotiating the information security terms of third-party vendor agreements, ensuring that those vendors maintain adequate information security, and purchasing cyber security insurance, and training employees.9 Since at least 2009, China has directed ‘‘the single largest, most intensive foreign intelligence gathering effort since the Cold War,’’ according to cybersecurity firm Medius Research.10 The increased success rate for intrusions against U.S. companies is often attrib- uted to the presence of government-run or government-sponsored VerDate Sep 11 2014 09:25 Nov 12, 2015 Jkt 094682 PO 00000 Frm 00206 Fmt 6601 Sfmt 6601 G:\GSDD\USCC\2015\FINAL\94682_R3.XXX
Recommended publications
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • A-Z Cyber Security Guide | Hiscox UK
    The A-Z of cyber security For small businesses The a-z of cyber security for small businesses A B C Hiscox cyber guide – A-Z foreword D Did you know that the total annual cost of cybercrime against small businesses, in 2014- E 2015 was around £5.26 billion1? This may seem surprising, but perhaps not when we consider that most information now exists as some form of digital asset, stored in places F that go far beyond the four walls of the business it belongs to. This means that most data G is potentially accessible to anyone in a given organisation, plus suppliers, partners and any number of external people with the right tools and knowledge. H As systems age and become more interconnected through the internet, the number of I security vulnerabilities is on the rise, with high profile breaches hitting the headlines regularly. J This, along with the rapidly evolving nature of cyber threats, has put cyber security at the top K of the agenda for many small business owners. L CGI’s recent study on cyber security in the boardroom conducted with the Centre for Economic and Business Research uncovered some of the key challenges that senior M business executives face when it comes to tackling cybercrime. The findings revealed that N 38% of the board-level executives asked expected their organisation to suffer a breach within the next twelve months. In dealing with cyber security, almost 28% of boardrooms in O the UK’s key sectors - telecoms, utilities, finance and retail - still view cyber security as an P IT issue, instead of the company-wide risk that it is.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Ajax Security Is a Remarkably Rigorous and Thorough Examination of an Underexplored Subject
    “Ajax Security is a remarkably rigorous and thorough examination of an underexplored subject. Every Ajax engineer needs to have the knowledge contained in this book—or be able to explain why they don’t.” Jesse James Garrett “Finally, a book that collects and presents the various Ajax security concerns in an understandable format! So many people have hopped onto the Ajax bandwagon without considering the secu- rity ramifications; now those people need to read this book and revisit their applications to address the various security short- comings pointed out by the authors.” Jeff Forristal “If you are writing or reviewing Ajax code, you need this book. Billy and Bryan have done a stellar job in a nascent area of our field, and deserve success. Go buy this book. I can’t wait for it to come out.” Andrew van der Stock, Executive Director, OWASP “Web technologies like Ajax are creating new networked business structures that remove the sources of friction in the new econ- omy. Regrettably, hackers work to compromise this evolution by capitalizing on the weaknesses in this technology and those who develop it. Until now, few books told the whole Ajax security story, educating those using or planning to use this technology. This one does.” Managing Partner, Trellum Technologies This page intentionally left blank Ajax Security This page intentionally left blank Ajax Security Billy Hoffman and Bryan Sullivan Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Cape Town • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • History & Impact of Hacking: Final Paper
    History & Impact of Hacking: Final Paper From HistoryOfComputing Contents 1 Introduction by everyone 2 The Word "Hacker" by Carmelo Kintana 2.1 Survey of Common Definitions 2.2 Etymology 2.3 Evolution 2.4 Perceptions 2.4.1 Public Perceptions 2.4.2 Insider Perceptions 2.5 Timeline of the word “Hack” 3 Expert Programmer by Vikas Rajvanshy 3.1 Hacker as an expert programmer 3.2 Impact on society 3.3 Famous hackers 3.4 Where did all the hardware hackers go? 3.5 Why are the top hackers today affiliated with Open Source? 3.6 What is the role of hackers in corporations? 4 Black Hat by Sandra Lemon & Hansen Liou 4.1 History 4.2 Early Examples 4.3 Modern Examples & Motivations 4.4 Impact of Hacking on Businesses and Governments 5 White Hat by Michael Frederick 5.1 Motivations 5.1.1 Kevin Mitnick 5.1.2 H.D. Moore 5.2 History 5.2.1 Rising out of the black hat community 5.2.2 Reformation of former black hats 5.2.3 Hacker literature 5.3 Popular culture 5.4 Impact 5.4.1 Society 5.4.2 Security 6 Conclusion by everyone 7 References History & Impact of Hacking > Final Paper Introduction by everyone The hacker culture began in the 1960s and 1970s as an intellectual movement: exploring the unknown, documenting the arcane, and doing what others cannot. Many hacker subcultures developed independently and in parallel at various universities throughout the United States: Stanford, MIT, CalTech, Carnegie Mellon, UC Berkeley, and many others. The completion of the ARPANET linked these campuses and they were able to share their collective experiences, their knowledge, humor and skills.
    [Show full text]
  • Computer Security 37 8.1 Vulnerabilities
    Contents 1 Antivirus software 1 1.1 History ................................................ 1 1.1.1 1949-1980 period (pre-antivirus days) ............................ 1 1.1.2 1980-1990 period (early days) ................................ 2 1.1.3 1990-2000 period (emergence of the antivirus industry) ................... 2 1.1.4 2000-2005 period ...................................... 3 1.1.5 2005 to present ........................................ 3 1.2 Identification methods ........................................ 4 1.2.1 Signature-based detection .................................. 4 1.2.2 Heuristics ........................................... 4 1.2.3 Rootkit detection ....................................... 5 1.2.4 Real-time protection ..................................... 5 1.3 Issues of concern ........................................... 5 1.3.1 Unexpected renewal costs ................................... 5 1.3.2 Rogue security applications .................................. 5 1.3.3 Problems caused by false positives .............................. 5 1.3.4 System and interoperability related issues ........................... 6 1.3.5 Effectiveness ......................................... 6 1.3.6 New viruses .......................................... 6 1.3.7 Rootkits ............................................ 6 1.3.8 Damaged files ......................................... 6 1.3.9 Firmware issues ........................................ 7 1.4 Performance and other drawbacks .................................. 7 1.5 Alternative solutions
    [Show full text]
  • U-Markt Peering Into the German Cybercriminal Underground
    U-Markt Peering into the German Cybercriminal Underground Forward-Looking Threat Research (FTR) Team A TrendLabsSM Research Paper TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and Contents should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the 4 particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro Market landscape reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 13 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro German underground makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree market offerings that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of 20 this document, or any errors or omissions in the content thereof.
    [Show full text]
  • Strategic Studies Quarterly, Fall 2012, Vol. 6, No. 3 (Cyber Special Edition)
    FALL 2012 Vol. 6, No. 3 Commentaries America’s Air Force: Strong, Indispensable, and Ready for the Twenty-First Century Gen Norton A. Schwartz, USAF, Retired Lt Col Teera Tony Tunyavongs, USAF Claiming the Lost Cyber Heritage Jason Healey Depleted Trust in the Cyber Commons Roger Hurwitz Escalation Dynamics and Conflict Termination in Cyberspace FALL 2012 FALL Herbert Lin Sharing the Cyber Journey Maj Gen Suzanne M. Vautrinot, USAF The Specter of Non-Obvious Warfare Martin C. Libicki Internet Governance and National Security Panayotis A. Yannakogeorgos The Customary International Law of Cyberspace Col Gary Brown, USAF Maj Keira Poellet, USAF Strategic Studies Quarterly An Air Force–Sponsored Strategic Forum on National and International Security VOLUME 6 FALL 2012 NUMBER 3 Commentaries America’s Air Force: Strong, Indispensable, and Ready for the Twenty-First Century . .3 Gen Norton A . Schwartz, USAF, Retired Lt Col Teera Tony Tunyavongs, USAF Claiming the Lost Cyber Heritage . .11 Jason Healey Part I Feature Article Depleted Trust in the Cyber Commons . .20 Roger Hurwitz Perspectives Escalation Dynamics and Conflict Termination in Cyberspace . .46 Herbert Lin Sharing the Cyber Journey . .71 Maj Gen Suzanne M . Vautrinot, USAF The Specter of Non-Obvious Warfare . .88 Martin C . Libicki Internet Governance and National Security . 102 Panayotis A . Yannakogeorgos The Customary International Law of Cyberspace . 126 Col Gary Brown, USAF Maj Keira Poellet, USAF Book Reviews Critical Code: Software Producibility for Defense . 146 National Research Council Reviewed by: Lt Col Deborah Dusek, USAF Airpower for Strategic Effect . 147 Colin S . Gray Reviewed by: Benjamin S . Lambeth, PhD Chinese Aerospace Power: Evolving Maritime Roles .
    [Show full text]
  • Investigating Web Defacement Campaigns at Large
    Investigating Web Defacement Campaigns at Large Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Forward-Looking Threat Research Team - Trend Micro, Inc. ABSTRACT supporting actors. Over the years, defacers have abandoned their Website defacement is the practice of altering the web pages of a interested in defacing for the mere purpose of advertising the com- website after its compromise. The altered pages, called deface pages, promise, pursuing defacement more as a mean to broadcast strong can negatively affect the reputation and business of the victim site. messages “to the World”—by compromising popular websites. Previous research has focused primarily on detection, rather than Despite several actors are still driven by the desire of promot- exploring the defacement phenomenon in depth. While investigat- ing their own reputation, an increasing number of defacers strive ing several defacements, we observed that the artifacts left by the instead to promote their ideologies, religious orientation, political defacers allow an expert analyst to investigate the actors’ modus views, or other forms of activism, often closely following real-world operandi and social structure, and expand from the single deface events (e.g., war, elections, crisis, terrorist attacks). We refer to this page to a group of related defacements (i.e., a campaign). However, phenomenon as dark propaganda, to highlight that legitimate re- manually performing such analysis on millions of incidents is te- sources are abused for pushing the actors’ viewpoints. For example, dious, and poses scalability challenges. From these observations, we in 2013–2014 “Team System Dz” defaced over 2,800 websites, and 1 propose an automated approach that efficiently builds intelligence planted pro-ISIL/ISIS content to protest against the US military 2 information out of raw deface pages.
    [Show full text]
  • Gaining Insights from Deface Pages Using Defplorex-NG
    Web Defacement Campaigns Uncovered Gaining Insights From Deface Pages Using DefPloreX-NG Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini Trend Micro Forward-looking Threat Research (FTR) Team A TrendLabsSM Research Paper TREND MICRO LEGAL DISCLAIMER Contents The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The 04 information contained herein may not be applicable to all situations and may not reflect the most current situation. Overview Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro 06 reserves the right to modify the contents of this document at any time without prior notice. Dataset of Defacement Records Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise 14 related to the accuracy of a translation, please refer to DefPloreX-NG: An Automated Analysis the original language official version of the document. Any discrepancies or differences created in the translation are Approach not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include 22 accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Implementation to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk.
    [Show full text]